CA1181830A - Device for encrypting each input data bit by at least one keying bit decided by a code pattern and a bit pattern of a predetermined number of preceding encrypted bits - Google Patents

Device for encrypting each input data bit by at least one keying bit decided by a code pattern and a bit pattern of a predetermined number of preceding encrypted bits

Info

Publication number
CA1181830A
CA1181830A CA000387315A CA387315A CA1181830A CA 1181830 A CA1181830 A CA 1181830A CA 000387315 A CA000387315 A CA 000387315A CA 387315 A CA387315 A CA 387315A CA 1181830 A CA1181830 A CA 1181830A
Authority
CA
Canada
Prior art keywords
bit
decryption
encryption
bits
pattern
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired
Application number
CA000387315A
Other languages
French (fr)
Inventor
Katsuhiro Nakamura
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
NEC Corp
Original Assignee
Nippon Electric Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from JP55139596A external-priority patent/JPS5763950A/en
Priority claimed from JP56034890A external-priority patent/JPS57150251A/en
Application filed by Nippon Electric Co Ltd filed Critical Nippon Electric Co Ltd
Application granted granted Critical
Publication of CA1181830A publication Critical patent/CA1181830A/en
Expired legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/065Encryption by serially and continuously modifying data stream elements, e.g. stream cipher systems, RC4, SEAL or A5/3
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/12Transmitting and receiving encryption devices synchronised or initially set up in a particular manner
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/12Details relating to cryptographic hardware or logic circuitry
    • H04L2209/125Parallelization or pipelining, e.g. for accelerating processing of cryptographic operations

Abstract

Abstract of the Disclosure:

An encrypting device for an input data bit sequence comprises a shift register for producing a bit pattern represented by successive encrypted bits for the data bits preceding a current bit. A bit pattern converter selects in compliance with the bit pattern a bit of a code pattern preset therein. A
keying bit may be provided by the selected bit, to which the current bit is added modulo two to produce a new encrypted bit. For more excellent encryption, the successively selected bits may be used to produce an additional bit pattern, responsive to which either the keying bit or an additional keying bit, to be also added to the current bit, may be provided by a selected bit of another code pattern. Each bit pattern converter may be preset with a plurality of code patterns. One or more encrypting devices may be used in encrypting a sequence of input data digits, each comprising a plurality of input data bits among which at least one bit may be a dummy bit. A decrypting device should have a structure corresponding to the counterpart encrypting device.

Description

I .~ 8 ~

DEVICE FOR ENCRYPTING EACH I~UT D~TA BIT BY AT LEAST ONE
KEYING BIT DECIDED BY A CODE PATTERN AND A BIT PATTERN
OF A PREDETERMINED NUMBER OF PRECEDING ENCRYPTED BITS

Background of the Invention~
This invention relates to an encrypting device for use either in transmitting or recordlng a digital signal, such as a PCM signal, with each digit encrypted. This invention relates also to a decrypting device for use in combination with the encrypting device, It is possible to provide an excellent encrypting and decrypting ~ystem by the use of algorithms released, 19~7 January 15, as FIPS PUB (Federal Information Processing Standards Publication) 46 by the National Bureau of Standards of the United States Department of Commerce (hereaf-ter called the DES algorithm), Sixteen iterations of a calculation are, however, necessary on encrypting s~xty-four-bit input data into sixty-four-bit encrypted data with the iterations preced0d by an initial permutation and followed by the inverse of the initial permutation. The encrypted data are therefore obtained with an appreciable delay, In addition, synchronism must be kept for the sixty-four bits, An encrypting and decrypting system revealed in United States Patent No, 4,172,213 issued to Vera L.~Barnes et al, assignors to Burroughs Gorporation, makes use of a DES chip, namely, a chip for the DES algorithm. Consequently, the system according to Barnes et al is not deYoid of the inconveniences inherent to the DES algorithm.

3 ~

It is possible to provide an encrypting and decrypting system by resorting to the scrambling and descrambllng technique, in which a maximal-length sequence generator is used. An example ls disclosed in an article contributed by J, E, Savage to "The Bell System Technical Journal," Vol, XLVI, No, 2 (February 1969), pages 449 4~7, under the title of "Some Simple Self-Synchronizing Digital Data Scramblers," Only a little number of keys are, however, available for encryption and decryption, ~urthermore, deciphering is possible even for an unauthorized recipient by analyzing a relatively small number of encrypted bits, such as 2m bits, where m represents the number of stages of a shift register used in the maximal-length sequence generator, Summary of the Invention:
It is therefore an object of the present invention to provide an encrypting device, by which input data digits are encrypted with a least possible delay, It is another object of this invention to provide an encrypting device of the type described, for which no spurious digits are necessary for synchronization.
It is still another object of this invention to provide an encrypting device of the type described, to which a great number of keys are available for encryption and decryption, It is yet another objec-t of this invention to provide an encrypting device of the type described, with which it is possible to produce an encrypted digit sequence dif`ficult for an unauthori~ed recipient to decrypt or decipher, It is a further object of this invention to provide a decrypting device for use as a counterpart of such an encrypting 3 ~ ~ ~ 83~

device, According to this invention, there is provided an encrypting device for encrypting a sequence of input data bits into a sequence of encrypted bits in response to a sequence of clock pulses timing the input data bits and the encrypted bits with a predetermined clock period; comprising memory means responsive to the clock pulses for memorizing a predetermined number m of the encrypted bits during each clock period to produce a memory output bit pattern represented by the m encrypted bits memorized therein, bit pattern converting means responsive to at least one code pattern for converting the memory ou-tput bit pattern to at least one keying bit, and modulo-two adding means for calculating a sum modulo two of each input data bit and the at least one keying bit to produce the sequence of encrypted bits with each encrypted bit given by the sum.
Preferably, the at least one code pattern consists of binary bits, equal in nu~.ber to 2 .
According to an embodiment of this invention, the at least one code pattern is at least two in number and given by a unit code pattern and at least one additional code pattern, The above-mentioned bit pattern converting means comprises a unit bit pattern converter for keeping the unit code pattern and responsive to the memory output bit pattern for producing a converted bit, a modulo-two adder for calculating a sum modulo two of the converted bit and the encrypted bit produced by the adding means during the above-described each clock period to produce a sum bit given by the sum calculated by the adder, shift registPr means responsive to the clock pulses supplied thereto ~ ~8 ~ ~3~

as shift pulses for retaining, during each clock period, a prescribed number of the sum bits successlvely prcduced by the adder to produce a shift register bit pattern represented by the sum bits retained therein, and additional bit pattern converting means responsive to the at least one add.L-tional code pattern for converting the shlft register bit pattern to the at least one keying bit, When viewed from a different angle, an encrypting device according to the above-described embodiment is an encrypting device comprising modulo-two adding means for calculating a first sum modulo two of each encrypted bit and an adding means input bit and a second sum modulo t~o of each input data bit and at least one keying bit to produce a sum bit given by the first sum and the se~usnce of encrypted bits with each encrypted bit given by the second sum, shift register means responsive to the clock pulses supplied thereto as shift pulses for retaining, during each clock period, a predetermined number m of the encrypted bits and a prescribed n~ber m' of the sum bits successively produced by the adding means to produce a unit and an additional shift register bit pattern represented by the m encrypted bits retained therein and the m' sum bits retained therein, respectively, bit pattern converting means responsive to a unit code pattern for converting the unit shift register bit pattern ~o a unit converted bit and responsive to at least one additional code pattern for converting the additional shift r~gister bit pattern to at least one additionaI.converted bit, and means for supplying the unit and the at least one additional converted bits to the adding means as the adding means input bit and the at least one keying bit, respectively.

3~

It is now readily possible to use one or more encrypting devices of the type described, for encryption of an input da-ta digit sequenee, where each digit is given by a plurality of parallel and/or series input dats bits, Sueh an input data digit sequenee is readily obtained by the use of a dummy bit even from a more general input data digit sequence having thrae or a llke number of leYels, Aecording to an aspeet of this invention, there is provided an encrypting device for encrypting a sequenee of input data digit into a sequence of encrypted digits in response to a sequenee of eloek pulses timing the input data digits and the enerypted di~its with a predetermined cloek period Eaeh input data digit eomprlses a first and a second input data bit. Each encrypted digit comprises a first and a second encrypted bit, The device according to this aspect of this invention comprises modulo-two adding means for calculating a first sum modulo two of eaeh first input data bit and at least one keying bit to produee a sequence of the first er.erypted bits ~ith each first encrypted bit given by the first sum, a second sum modulo tHo of each second input data bit, the at least one keying bit, each first encrypted bit, and a first and a seeond adding means input bit to produce a sequenee of the second encrypted bits with each second encrypted bit gi~en by the second sum, and a third and a fourth sum modulo two of each first encrypted bit and the first'and the second adding means input bits to produce a first and a second adding means output bit given by the th~rd and the fourth sumsl respectively, shift register means responsive to the clock pulses supplied thereto as shift pulses for retaining, during each clock period 3 ~

a predetermlned nvmber m of the second encrypted bits, a first prescribed number ml of the first adding means output bits successive-ly produced by the adding means, and a second prescribed number m2 of the second adding means output bits successively produced by the adding means to produce a unit and a first and a second additional shift register bit pattern represented by the m second encrypted bits and the ml first and the m2 second adding means output bits retained therein, respectively, bit pattern converting means responsive to a unit and a first and at least one second additional code pattern for converting the unit and the first and the second additional shift register bit patterns to a unit and a first and at least one second additional converted bit, respectively, and means for supplying the unit and the first and the at least one second additional converted bits to the adding means as the first and the second adding means input bits and the at least one keying bit, respectively.
According to this invention, there is also provided a decrypting device for decrypting the encrypted bit or digit sequence produced by the encrypting device of the type described, into a sequence of decrypted bits or digits by the use of a sequence of local clock pulses of the predetermined clock period Brief Description of the Drawing~
Fig. 1 shows in blocks an encrypting device according to a first embodiment of the instant inventioa together with a decrypting device for use in combination with the encrypting dev~ce to form an encrypting and decrypting system;
Fig, 2 is a block diagram of an encrypting device according to a second embodiment of this invention;

3 ~

Fig, 3 is a block diagram of a decrypting device for use in decrypting an encrypted bit sequence produced by the encrypting d0vice depicted in Flg, 2;
Fig, 4 is a block diagram of an enc~ypting device according to a third embodiment of this invention;
Fig, 5 is a block dlagram of a decrypting device for use as a counterpart of the encrypting device illustrated in Fig, 4l Fig, 6 is a block diagram of an encrypting device according to a fourth embodiment of this invention;
Fig, 7 is a block diagram of a decrypting device for use in combination with the encrypting device shown in ~ig, 6;
Fig, 8 is a block diagram of an encrypting device according to a fifth embodiment of this invention; and Fig, 9 is a block diagram of a decrypting device for use in decrypting an encrypted digit sequence produced ~y the encrypting device illustrated in Fig. 8, Description of the Preferred Embodiments:
~ eferring to Fig, 1, an encrypting device according to a first embodiment of the present invention is for encrypting a sequence of input data bits into a sequence of original encrypted bits in response to a sequence of encryption clock pulses of a predetermined encryption clock period, Each of the input data bits and the encrypted bits is capable of tak~ng either of binary ~ero and one at each clock period, When desired, the input data bit and the original encrypted bit at each clock period t, will be designated by at and bt, respectively, The input data bit sequence and the original encrypted bit sequence will be denoted 1 8 ~ ~

by {at3 and ~bt}, respectively~
A device input terminal ll.is supplied with the input data bit sequence, A feedback line 12 is supplied with a preselected number s of sequences of encryption keying bits as will presently be described, Unity may be selected as the preselected number, ~hen two is ~elected as the preselected number, the feedback line 12 is substantially simultaneously supplied with two keying bits of the respective sequences during each clock period. ~uch one or more keying bits ~ill collectively be denoted by kt, An encryption adder 13 is for calculating a sum modulo two of each input data bit at supplied from the input terminal 11 and the one or more keying bits kt concurrently supplied from the feedback line 12, The modulus of two is used, irrespective of the preselected number, The adder 13 produces the encrypted bit sequence, with each enc-ypted bit bt given by the sum, The encrypted bit sequence is delivered to a device output line 14 and thence to a transmission line 15, Alternatively, the encrypted bit sequence may be supplied to a recording medium, as of a magnetic disk or drum, to be recorded thereon.
The encrypted bit sequence is supplied also to an input terminal of an encryption shlft register 16 having a predetermined number m of stages, The shift register stages will be named first through (m-l)-th and m-th encryption stages as counted from the encryption stage having the shift register inpu~ terminal, Each shift reg~ster stage has a stage output terminal, The clock pulses are used as sh.ift pulses for the shift register 16, During each clock period, the shift register 16 simultaneously produces the contents of the respective stages, namely, a set of m successive encrypted bits memoriv.ed in the respective stages, as first through (m~ th and m-th encryption output signals, In other words, ths shift register 16 distributes tne encrypted bit sequence into m parallel sequences of the encrypted bits, As will become clear as the description proceeds, it is possible to define an encryptio:n memory output bit pattern by each set of the first through -the m-th output signals simultaneous~
ly produced by the shift register 16, The parallel encrypted bit sequences are indicative of a sequence of successive enGryptlon memory output bit patterns. The memory output bit pattern may be defined by the first through the m-th output signals arranged according to the ordinal numbers, such as from the first to the m-th output signals, For such a predetermined permutation of the memorized bits, the greates-t possible number, designated by M~ of different memory output bit patterns amounts to 2m, In any event, it is possible to discriminate the memory out?ut bit patterns from one another by a plurality of indices, M in number, allotted to the different memory output bit patterns, respectively, An encryption bit pattern convsrter 17 is preliminarily supplied with at least one code pattern, s in number, to keep the at least one code pattern, The code pattern or patterns, collectively designated by K, are preset in the bit pattern converter 17 either manually or otherwise as sym~olically indicated by a pattern lead 18, Each code pattern is for specifying an encryption keying bit according to each memory output bit pattern or each index, It is therefore possible to understand that each code pattern defines a feedback funct:ion, The same keying bit may 3 ~

be specified by different ones of the memory output bit patterns, ~esponsive to the successive memory output bit patterns, the bit pattern converter 17 supplies the feedback line 12 with the s keying bit or bits depending on each memory output bit pa-ttern or each index and the s preset code pattern or patterns K, It is readily possible to implement such a bit pat-tern converter either by a read-only memory usually abbreviated to ROM in the art or a microprocessor, By way of example, let each encryption memoxy output 0 bit pattern define a binary number i by:
i = bo ~ bl-2 + b2'2 ~ b 1,2 where bo~ bl, ,,., and bm 1 are representative of the first through the m-th encryption output signals, namely, the original encrypted bits produced during a certain encryption clock period from the first through the m-th encryption shift register stages, respectively, The binary number is variable between zero and (2 - 1), both inclusive, It is possible to decide the indices oy index numbers i's equal to one plus the respective binary numbers i's, The index number is variable between one and 2m or M, It is unnecessary that the indices be identified by such natural numbers, It is preferred that each code pattern consists of first through M-th code pattern bits of a pattern length equal to the greatest possible number M, Wh~n the index takes an index number 1. the bit pattern converter 17 may produce the j-th bit of each code pattern as an encryption keying bit.
For instance, let first and second unit code patterns Kl and K2 preset in the bit pattern converter 17 be:

3 ~

Kl = ~01100110) and K2 = (00001111), assuming that the predetermined number m is three for brevity of description, When the predetermined permutation of the memori~ed bits of the encrypted bit sequence is (000) to render the index number i equal to unity, the keying bits are two first bits of the respective unit code patterns, namely, O and 0. When the predetermined permutation is (100) to make the index number i take a value of two, the keying bits are two second bits 1 and O, When the predetermined permutation is (111) to make the index number i give eight, the keying bits are two eighth bits 0 and 1.
More in general, let first through s-th unit code patterns Kl through K of such a pattern length M be~
s Kl - (ko ~ kl ~ ~ kM-l )' K2 - (ko ~ k~ ' kM-l ) ' ....
and Ks ~ (ko ~ kM_l )~
where each of kol, kIl, .,., and kM ls represents a code pattern bit of e~ther binary zero or binary one, On the other hand, a single code pattern X of the pattern length M will be considered, which is given by:
K = ~tkol ~3 ko2 ~ ,,, ~ koS), (kl ~ kl2 ~ .,, ~ k s) ....

_l ~ kM_l ~ 9 kM-l )~ ' where the symbol ~ represents a sum~ation modulo two, If preset with the single code pattern, the bit pattern converter 17 supplies 8 3 ~

the adder 13 with a single encryptlon keying bit in response to each memory OlltpUt bit pattern or each index, An original encrypted bit sequence produced by addition of the input data bit sequence and the single keying bit sequence modulo two is identical wlth the original encryp-ted bit sequence produced in response to the s keying bit sequences, The s prese-t unit code patterns Kl through Ks are therefore equivalent to the single code pattern K, It may, however, be as will shortly be discussed that an encryption bit pattern converter for two or more unit code patterns and another encryption bit pattern converter for the single code pattarn defined as above, are different from each other as regards hardware. It has been confirmed by Applicant that implementation of a bit pattern converter becomes more readily feasible depending on choice of the preselected number s.
~ everting to the example where the preselected number s is two, let first and second unit code patterns ~1 and K2 be more generally:
~ = (ko~ k~ /2-1' ko~ kM/2-l) and ~2 = (- 0, ,,,, 0, 1, 1, ,,., 1), respectively. The first code pattern is given by a concatenation of two code patterns, each having a pattern langth equal to M/2 or 2 1 bits, In the second code pattern, th~ number of binary zeros and the number of binary ones are equal to each other, namely, to ~l/2, The single code pattern ~ becomes~
K = ~ko~ klt ~ /2-1' ( ~

(k~ (k~l/2_1 ~) 1 ) .3 -1 181~3~

With a bit pattern converter for the two code patterns Kl and ~2~ a ~irst keying bit produced in response to the fir~t code pattern is dependent only on the first through the (m-l)-th output signals bo to bm 2 simultaneously produced by the shift register 16 and is independent on the m-th output signal bm 1~
A second keying bit produced in response to the second code pattern is identical with the m-th output signal bm_1, It is therefore possible to implement the bit pattern converter by an ROM of a half number of memory bits as compared with another bit pattern converter for the single code pattern K. The former bit pattern converter is more peadily implemented than the latter bit pattern converter, This applies to bit pattern converters comprising microprocessors, Turning to Fig, 2 for a short while, an encrypting device according to a second embodiment of this invention is similar to that illustrated with reference to Fig, 1, except that two unit code patterns Kl and K2 are selected as described above, The feedback line 12 described in conjunction with Fig~
1 is depicted as first and second feedback leads 21 and 22.
The encryption bit pattern converter 17 comprises a unit encryption bit pattern converter 26 and an encryption conductor 27. The bit pattern converter 26 is preliminarily loaded wi~h the ~/2-bit code pattern and is responsive to the first through the ~m-l)-th output signals for supplying a first encryption keying bit to the first feedback lead 21, Responsive to the m-th output signal, the conductor 27 supplies a second encryption keying bit to the second feedback lead 22. The first and the second keying bits are equivalent to a single encryption keying bit produced in 3 ~

response to the single M-bit code pattern and a memory output bit pattern composed of the first th~ough the m-th output signals of the shi~t register 16.
With an encryp-ting device illustrated with reference to either of ~lgs, 1 and ~, each input data bi-t is encrypted into an original encrypted bit with a delay equal to that of the adder 13, This is astonishingly shorter than the delay that has been necessary with an encrypting device according to the DES algorith~ referred to hereinabove, At the staxt of a new sequence of input data bits, the shift register 16 might be loaded with the encrypted bits produced during encryption OI a next previous sequence of input data bits. This does not adversely affect proper operation for the new sequence, At any rate, all possible memory output bit patterns will appear with a common probability during a sufficiently long interval o~ time, Th2 bit pattern converter 17 therefore produces the respective bits of each code pattern with an equal frequency, Let it now be assumed that unity is selected as the preselected number s. This does not result in loss of generality in principle as discussed heretobefore. The bit pattern converter 17 produces each bit of the single code pattern with a frequency dependent on the pattern length M, The adder 13 inverts the polarity of the input data bits at a rate equal to a ratio of - the number of binary one code pattern bits toOthe pattern length
2~ M expressed in terms of the number of code pattern bits, To speak of the encrypting device of Fig. 2 in particular, the ratio mentioned above is e~ual to 0,5, The adder 13 therefore produces the encrypted bits with the polarity of a half of the 8 3 ~

input data bits inverted in the encrypted blt sequence on the average. This gives an unexpectedly.raised degree of secrecy to the encrypted bit sequence, What corresponds in the encrypting devices illustrated with reference to Figs~ 1 and 2 to the key as called in the art, is the at least one code pattern preset in the bit pattern converter 1~. As the case may be, the at least one unit code pattern is preset in the unit bit pattern conYerter 26, In view of the above-discussed substantial equivalency between a single code pattern and two or more unit code patterns, the gxeatest possible number of di~ferent code patterns is equal to 2J, where J represents the greatest possible number of different memory output bit patterns, For the encrypting device of Fig. 1, the latter greatest possible number J is equal to M, For the encrypting device of Fig, 2, the latter greatest possible number J is equal to M/2. In the latter case, the greatest possible number of different code patterns is as great as 28 or 256 even when only four is selected as the predetermined num~er m. In a conventional encrypting device with a maximal-length sequence generator of four shift register stages, the number of keys is only tNo, It is therefore possible with the encrypting device according to this invention to qulte astonishingly increase the number of keys, from which one or a few are selected for use in the encrypting device, It is, however, to be noted that the greatest possible number J of different code patterns decreases to a certain extent as will later be discussed when the code patterns are selected so as to have substantially no cross-correlation, It is nevertheless possible with the encrypting devices illustrated with reference to Figs. 1 and 2 to provide an unexpectedly increased number of keys.
Referring back to Fig. 1, a decrypting device is for use as a counterpart o~ the encrypting device illustrated with reference to that figure. Responsive to a sequence of local clock pulses of a local clock period equal to the predeternined encryption clock period and responsive to the encrypted bit sequence which is either received from the transmission line 15 or reproduced from the recording medium and which will be called a sequence of "receive" encrypted bits, the decrypting device supplies a device output terminal 31 with a sequence of decrypted bits that is a reproduction of the input data bit sequence. The decrypted bit and the receive encryp-ted bit at each clock period t Hill be designatea again by at and bt, respectively. As will presently be described, decryption keying bits kt of tne preselected number s are fed to a feedforward line 32 during each local clock period.
A decryption adder 33 is for calculating a sum modulo two of each receive encrypted bit and the decryption keying bit or bits concurrently supplied from the feedforward line 32, 'rhe receive encrypted bit sequence is supplied to the adder 33 through a device input line 34, 'rhe decrypted bit sequence is given by a sequence of the sums modulo two.
~ esides the decryption adder 33, the receive encrypted bit ~equence is supplied to an input terminalof a decryption shift register 36 of the structure and operation of the encryption shift register 16 used in the counterpart encrypting device.
The decryption memory output bit pattern should be given by that permutation of the decryption output signals of the shift register ~ ~8~ ~0 36 which is the same as that used on deriving the encryption memory oùtput bit pattern. A decryption bit pattern converter 37 is preliminarily loaded with the code pat-tern or patterns K, s in number, used in the encryption bit pattern converter 17. A pattern lead 38 may be used on loading the decryption bit pattern converter 37 with the code pattern or patterns, Reviewing the encrypting device under consideration, it is possible to denote the original encrypted bits retained in the first through the m-th stages of the shift register 16 when an input data bit at is supplied to the encryption adder 13, as a current input data bit, by:

(bt_l, bt_2' '~'' bt-m)' respectively, The encryption keying bit or bits delivered to the adder 13, are kt, An original encrypted bit bt produced 5 at this instant is therefore given by~
bt = ~t ~3 kt' If the original encrypted bit sequence ~bt~ is supplied to the decryption adder 33 and the decryption shift register 36 for the decryption bit pattern converter 37 with no error, the receive encrypted bits retained in the first through ths m-th decryption stages of the shift register 36 are:

(bt_l, bt_2' '' bt-m)' when a receive encrypted bit bt reaches the decryption adder 33 and the decryption shift register 36 throu~h the lnput line 34~ It is clear from this that synchronism is automatically established between the encrypting and the decrypting devices without resorting to a superfluous synchronizing bit, The decryption keying bit or bits produced by the decryption bit pattern converter 37 are identical ~ith the encryption keying bit or bits kt used in the counterpart encrypting device on derlving the original encrypted bit bt. The decryption adder 33 therefore produces a decrypted bit, denoted by at, asl t t ~ t' producing a correct reproduction of the input data bit sequence, When an error appears in the receive encrypted bit sequence at a particular receive encrypted bit bt', errors will occur in the decrypted bits for a duration of (m ~ 1) clock periods, during which the particular receive encrypted bit is present in the decryption shift register 36. The decrypting device returns to normal in the (m ~ 1) clock periods with the synchronism automatical-ly restored and ~ith the receive encrypted bit sequence correctly decrypted, Turning to Fig, 3, a decrypting device for use in combination with the encrypting device illustrated with reference to Fig, 2 comprises si~ilar parts designated by li~e reference numerals, The feedforward line 32 illustrated in Fig, 1 is depicted as first and second feedforward leads 391 and 392' The decryption ~0 bit pattern converter 37 comprises a unit decryption bit pattern converter 393 and a decryption conductor 394 corresponding to the unit encryption bit pattern converter 26 and the encryption conductor 27.
In order to insure the secrecy of i~nformation with the decryption devices illustratad ~ith refexence to Figs, 1 and 3, it is desirable that nearly a half of the decrypted bits should have a polarity opposite to the other decrypted bits if the decryption bit pattern converter 37 or 393 ~ere loaded ~ith 1 ~81~3~

an erroneous code pattern which is different from a correct code pattern prese-t in the counterpart encryption bit pattern converter 17 or 26, The erroneous code pattern or a single erroneous code pattern equivalent to an erroneous code pattern and other code pattern or pattexns, will be denoted by K', Considering -the encrypting and the d0crypting devices of ~ig, 1, it wi-ll be assumed that the erroneous code pattern K' consists of first through M-th code pattern bitst (ko~ ~ kl',, ,,, kljl-l' ), 10 The encryption keying bit produced by the encryption bit pat-tern converter 17 according to the illustrated example during a clock period t in response to an encryption memory output bit pattern of the binary number i, is the (i~ th correct code pattern bit ki, which will be designated by kt(i). The orlginal 1$ encrypted bit produced by the encryption adder 13 for an input data bit at is given by~

bt = at (~) kt ( i ) -The decryption memory output bit pattern produced by the decryption shift register 36 when a receive encrypted bit bt arrives at the input line 34, are identical with the encryption memory output bit pattern used on producing the original encrypted bit under consideration The decryption keying bit produced by the decryption bit pattern converter 37 is therefore the (i~l)-th erroneous Gode pattern bit ki', which may or ~ay not be identical with the correct code pattern bit kt~i~ and will be denoted by kt(l)', The decrypted bit, now designated by at', is therefore given bys at~ = bt ~3 kt
3 ~

= at ~ (kt(i) 0 kt(i) ) As described before, use of any one of the code pat-tern bits is equally probable both for the correct and the erroneous code patterns K and K'. Considerlng a combined code pattern (K ~3 K'), ths ratio of the number of decrypted bits of a certain polarity to the number of other decrypted bits is decided by the number of binary ones included in the code pattern bits of the combined code pattern, The combined code pattern represents what is referred to in the art as a signal or intercode distance between the two code patterns K and K', It is now understood that the code patterns to be preset in the encryption bit pattern converter 17 and consequently in the decryption bit pattern converter 37 should be selected from a set of code patterns or keys in which the intercode distance between any two element code patterns is neither equal to zero nor to the greatest possible number of memory output bit pattern J, such as M, but is equal to or near to a half of that greatest possible number J/2, Various methods of obtaining such a code pattern set are already known as problems in the code theory, Some are described by ~. ~. Peterson and E, J. Weldon, Jr., in a book entitled "Error Correcting Code," Second Edition, 1972, published by "The MIT Press," pages 206-211.
One of such code pattern sets will be given in Table, which follows, for a pattern length J of sixteen bits, na~ely, ?3 for four-bit encryption or decryption memory output bit patterns.
S~x bits of each code pattern are for use as information bits and ten remaining bits, as redundant bit~, Inasmuch as the information blts are six in number, the code pattern sst consists of sixty-four ~ 1811 ~

siemsnt code patterns Kl through K64A Each code pattern may be represented in general by (kot kl, ,.,, kl5). The code patterns have a feature such that the bits arranged in a certain permutation, such as (k3, kg, k5, kl3, k3~ k6~ klo~ k2~ k4~ kll' ko' ~ ' k8' kl2, kl5, kl4), is an element code pattern of a minimum intercode distance (a minimum weight) of six and a maximum intercode distance (a mixumum Height) of ten, The first six bits (k3, k9, kS, kl3, kl, k6) are used as the information bits and the remaining bits, as the redundant bits, It is possible to predetermine the permutation in an optional manner, The element code patterns are the BCH
cyclic codes as called in the art, Table ko kl k2 k3 k4 k5 k6 ~ k8 k~ ~ o kll kl2 kl3 14 15 K~. 1 0 0 0 1 0 1 0 0 0 0 1 1 0 0 Klo -1 0 1 0 1 0 1 0 1 1 1 0 1 0 0 0 Kll 0 1 0 0 1 0 0 0 0 1 1 0 1 0 0 K~3 1 1 1 1 0 0 0 0 1 1 1 1 0 1 0 1 ~8~ 83~

(Table continued) K15 1 1 1 1 0 1 0 1 1` 1 0 1 1 0 0 K16 1 0 1 0 0 1 1 1 0 0 1 0 0 0 0 () l~64 1 1 0 1 1 1 0 1 1 1 0 0 1 1 0 0 The element code patterns in the Table are determined as follows.
At first, the information bits (k3, kg, k5, kl3, kl, k6) are given binary zero or zeros and one or ones in different manners for the respective code patterns For example, the information bits of the element code patterns Kl and X2 are given (000001) and (000010~. Next, a polynomial of x is defined for each code pattern byl k3Xl4 I k9Xl3 ~ k5Xl2 ~ 1~3xll ~ klxl ~ k6x9, The polynomlal is divided by:

(x4 I x ~ l)(x ~ x3 ~ x ~ x ~ l)(x ~ 1).

The remainder is written as a polynomial:

rlx8 + r2x7 ~ r3x6 ~ r4x5 ~ r5x4 t r6x3 ~ r7x2 ~ r8x ~ r9, Nine of the ten red~mdant bits are determined by:

klo = rl k2 = r2 k4 = r3 k - r4 ko = r5 k7 =.r6 k8 = r~ kl - r8 k - r , The last redundant bit kl4 in each code pattern is the even parity bit as named in the art, That is, the last bit is decided so that each code pattern may consist of an even number of binary o~es In each element code pattern, the redundant bits are uniquely decided by the infromation bits as described above, It is therefore possible to make the encryption or decryption bit pattern converter produce only the lnformation bits of a preset one of the code patterns in response to the memory output bit pattern and immediately thereafter the redundant bits. The redundant bits may be produced by another ROM section accessed by the information bits, Alternatively, the microprocessor may calculate the redundant bits in response to the information bits.
The element code patierns include binary ones, from six to ten in number. The original encrypted bit sequence therefore includes polarity inverted bits at a ratio between 6¦16 or 0,375 and 10/16 or 0.625, The degree of encryption is remarkably excellent.
When the receive encrypted bit sequence is decrypted by the use of at least one erroneous code pattern, the decrypted bit sequence includes polarity inverted bits at the above-mentioned ratio, The "decrypted" information can hardly bs understood by the recipient of the original encrypted bit se~uence, 2Q With an encrypting and decrypting system described above with reference to the drawing figures, an unauthorized recipient must find out the code patterns on deciphering an encrypted bit sequence. It is, however, very difficult for him to know all bits of a code pattern from a portion the~eof, This is because 2~ he has no in~ormation as regards those bits of a code pattern from which other bits are decided as described in conjunction wIth the BC~ cyclic code, ~urthermore, all bits may be selectad independently of one another, He must analyse a considerable t :~8~3~

number of the encrypted bits, such as 2 bits, The number 2 is usually greater than ths number 2m described hereinabove in connection with an encrypting and decrypting system of the type described in the Savage article, Re~erring now to Fig, 4, an encrypting device according to a third embodiment of this invention comprises similar parts designated by like reference numerals, The encryption bit pattern converter 17 comprises first through third encryption converters 41, 42, and 43 loaded with first through third code patterns ~1' K2, and K3, each of which may be the single code pattern described before, ~esponsive to each encryption memory output bit pattern produced by the encryption shift register 16 and the code patterns ~ through K3, the converters 41 to 43 produce first and second converted encryption bits ct and dt and the at least one encryption keying bit kt, respectively, as follows, A first additional encryption adder 46 is for calculating a first encryption sum modulo two of the original encrypted bit bt and the first converted bit ct. The sum giYes a first encryption sum bit ft, The first sum bits ft's successively produced by the adder 46 are stored and shifted in a first additional encryption shift register 4~, which produces a first additional encryption memory output bit pattern, ~esponsive to the first additional memory output bit pattern and the second code pattern, the second converter 42 produces the second converted bit, A second additional encryption adder 48 is for calculating a second encryption sum modulo two of the encrypted bit bt and the second converted bit dt, The second sum gives a second encryption sum bit gt, The second sum bits gt's are treated by a second additional encryption shift register 49 into a second additional encryption memory output bit pattern, supplled with ~lhich the third conYerter 43 produces the at least one encryption keying bit according to the third code pattern K3, With an encrvpting device illustrated above with reference to Fig. 1 or 2, the encrypted bits are shifted into a single shift register 16 as they are, In contrast, the encrypted bits are not shifted in the additional shift registers 47 and 49, This makes it more difficult for an unauthorized recipient to decipher the encrypted bit sequence, Reviewing ~ig. 4, the bit pattern converter 17 comprises a unit encryption bit pattern converter 41 preliminarily loaded with a unit code pattern ~ and responsive to an encryption memory output bit pattern produced by the encryption shift register 16 for producing a converted encryption bit ct, An encryption adder 46 calculates the first sum modulo two to produce an encryption sum bit ft given by the sum. Using the encryption clock pulses as shift pulses, an additional encryption shift register 47 retains a prescribed number ~ of such sum bits ft's during each encryption clock period and produces an encryption shift register bit pattern represented by the ml sum bits retained therein, An additional encryption bit pattern converter 42 preliminarily lbaded with an additional code pattern K2, may directly supply the adder 13 with the encryption keying bit or bits kt, Alternatively, an additional encryption bit pattern converting section may comprise the bit pattern converters 42 and 43, the other adder 48, and the other shift register 49, The shift registers 17, 47, and 49 have a predetermined number m of stages, a first prescribed number ml of stages, and a second prescribed number m2 of stages, respectively, The predetermined and the first and the second prescribed numbers may or may not be equal to one another, When viewed from a d~fferent angle, the encrypting devlce comprises a modulo-two encryption adding section comprising the adders 4O and 13 for calculating a first encryption sum modulo two of each origlnal encrypted bit bt and an encryption adding section input bit ct and a second encryption sum modulo two of each input data bit at and at least one encryption keying bit kt to produce an encry~Dtion sum bit ft given by the first sum and the sequence of original encrypted b~ts with each original encrypted bit given by the seconl sum, An encryption shift register section comprising the shift registers 16 and 47 are supplied with the encryption clock pulses as shift pulses and retains, during each encryption clock period, a predetermined nu~ber m of the original encrypted bits and a prescribed number m' of the encryption sum bits successively produced by the adding section to produce a unit and an additional encryption shlft register bit pattern represented by the m encrypted bits retained therein and the m' successive sum bits retained therein, respectively, An encryption bit pattern converting section comprises the first converter 41 responsive to the unit code ~attern K
for converting the unit shift register bit pattern to a unit converted encryption bit ct, which is supplie,d to the adding section as the adding section input bit ct, The bit pattern converting section further co~.prises the second converter 42, the second adder 48, the second ~dditional shift register 49, and the third converter 43 and are loaded with two code patterns ~2 and K3 as at least one code pattern for converting the additional shift register bit pattern to at least one additlonal converted encryption bit, which is supplied to the adding section as the above-mentioned at least one keying bit, As described above, the encryption bit pattern converting section may comprise a unit encryption bit pattern converter 41 preliminarily loaded with the unit code pattern ~ and responsive to the unit encxyption shift register bit pattern for produclng the unit converted encryption bit ct, A first addltional encryption bit pattern converter 42 is preliminarily loaded with a first addltional code pattern K2 and responsive to the additional encryption shift register bit pattern for producing an intermediate converted encryption bit dt, ~ne converting section furthe~ comprises a modulo-two encryptlon adder 48 for calculating a sum modulo two of the intermediate converted encryption bit dt and the original encrypted bit bt produced by the adding section during the above-men-tioned each encryption clock period to produce an lntermedlate encryption bit gt given by thé sum calculated -tnereby, and an encryption shift register 49 responsive to the encryption clock pulses supplied thereto as shift pulses for retaining, during each encryption clock period, a preselected number m" of the intermediate encryption bits successively produced by the adder 48 to produce an auxiliary encryption sh~ft reglster bit pattern represented by the intermediate encryption bits retained thereby, A second additional encryption bit pattern converter 43 is prellmlnari-ly loaded with a second addltional code pattern K3 and responsive to the auxiliary shift register bit pattern for producing the at least one addltional converted bit.

3 ~

A decrypting device depicted in Fig, 5 is for use as a counterpart of the encrypting device of Fig, 4 and comprises similar parts designa-ted by the reference numerals 31, 32, 33, 34, and 36, First through third decryFtion bit pattern converters 51, 52, and 53, a first additional decryption adder 56, a first additional decryptlon shift register 57~ a second additional decryption adder 58, and a second additional decryption shift register 59 are counterparts sf the elements 41 through 43 and 46 through 49. The unit and the additional code patterns Kl through K3 are used to produce first and second converted decryption bits ct and dt and at least one decryption keying bit kt in response to the receive encrypted bit bt and first and second modulo-two decryption sums f~ and gt, Inasmuch as in Fig, 4 at (3 kt - bt' it is obvious that:
t ~ t = t' that is, the decrypted bits at's are correct reproductions of the respective input data bits, Referring to Fig. 6, an encrypting device according to a fourth embodiment of this invention comprises similar parts designated by like reference numerals, Two feedback lines 21 and 22 are supplied with a unit encryption keying bit ~t and at least one additional encryption keying bit k2t, The encryption adder modulG two 13 is shown separately as un~it and additional encryption adders modulo two 61 and 62, The encrypting device being illustrated is different from that illustrated with reference to Fig, 2 in that the encryption bit pattern converter 17 comprises unit and additional encryption bit pattern converters 63 and 8 3 ~

64 preliminarily loaded with unit and at least one additional code patterns Kl and K2, respectively, The unit code pattern converter 6~ ~s for producing the unit keying b~t klt in response to the encryption memory output bit pattern produced by the encryption shft register 16, The additional bit pattern converter 64 is accompanied by flrst and second additional encryption shift registers 66 and 67 for retaining, during each encryption clock period, first and second prescribed numbers ml and m2 of the unit keying bits successively produced by the unit encryption bit pattern converter 63, respectively. The first and the second additional shift registers 66 and 67 are for producing, in cooperation with each other, an encryption shift register bit pattern represented by a predetermined permutation of the ml and the m2 unit keying bits retained therein, respectively, Responsive to the shift register bit pattern, the additional bit pattern converter 64 produces the at least one additional encryption keying bit k2t, It is possible to optionally select the predetermined and the first and the second prescribed numbers, The pattern length of the additio~lal code pattern is decided according to the greatest possible number of different shift register bit patterns produced by the cooperation of the shift registers 66 and 67. The original encrypted bit bt is given bys bt - at (~) klt ~) k2t' A decrypting device shown in Fig, 7~is for use in combination with the encrypting device illustrated with reference to Fig. 6.
Elements 61', 62', 63', 64', 66', and 67' are equivalents of the elements 61 through 64 and 66 and 67. It is obvious that each decrypted bit given by a su~n modulo two (bt e3 klt ~ k2t) is 3o a faithful reproduction of the input data bit, It is very difficult for an unauthorized recipient to decipher the encrypted bit sequence because the original encrypted bits are not shifted in the additional shift registers 66 and 67 in the encryptlng device.
With the encrypting and decrypting system so far described with reference to Figs, 1 thro~gh 7, it is possible to encrypt a sequence of input data digits, each comprising a plurality of parallel and/or series bits, into a sequence of original encrypted digits and to carry out the decryption, For example, only one of the parallel and/or series bit sequences may be encrypted into a sequence of original encrypted bits by one of the encrypting devices. Alternatively, all parallel ~ndjor series bit sequences may be encrypted by the same or different encrypting devices, Turning now to Fig. 8, an encrypting device according to a fifth embodiment of this invention is for encrypting a sequencP
of input data digits, each comprising first and second parallel input data bits alt and a~t, into a sequence of origlnal encrypted digits, each comprising first and second original encrypted bits blt and b2~. The first and the second input data bits may be any two of a plurality of parallel input data bits for each input data digit, In an encryption modulo-two adding section, a first encryption adder 71 is for calculating a first encryption sum modulo two of each first input data bit and at least one encryption keying bit kt to produce a sequence of the first original encrypted bits with each first original encrypted bit given by thP first sum, A combination of second through fifth encryption adders 72, 73, 74, and 75 is for calculating a second encryption sum modulo two of each second input data bit, the at least one keying blt, each first original encrypted bit, and first and second encryption adding section input bits ct and dt to produce a sequence of the second original encrypted bits with oach second original encrypted bit given by the second sum. Sixth and seventh encryption adders,7~and 77 are for calculating a third and a fourth encpytion sum modulo two of each first original encrypted bit and the first and the second adding section input bits to produce first and second encryption adding section output bits ft and gt given by the third and the fourth sums, respectively.
An encryption shift register section ~s responsive to the encryption clock pulses supplied thereto as shift pulses, A unit encryption shift register 81 is for retaining a predetermined number m of the second original encrypted bits during each encryption clock period, A first additional encryption shift register 82 ~
is for retaining a first prescribed number ml of the first adding section output bits successively produced by the sixth adder 76, A second additional encryption shift register 83 is for retaining a second prescribed number m2 f the second adding section output bits successively produced by the combination of adders 72 through 76. The unit and the f~rst and the second additional shift registers 81 through 83 concurrentiy produce a unit and a first and a second additional sh~ft register bit pattern represented by the m second original encrypted bits and the ml first and the m2 second adding section output bits retained therein, respectively, In an encryption bit pattern converting section, a unit bit pattern converter 86 is for keeping a unit code pattern ~1 and for converting the unit shift register bit pat-tern to a unit converted encryption bit A first additional ~ncryption bit pattern converter 87 is for keeping a first additional code pa~tern K2 and for converting the first additional shi~t register bit pattern to a first additional converted encryption bit, A second additional encryption bit pattern converter 8~ is for keeping at least one second additional code pattern K3 and *or converting the second additional shift register bit pattern to at least one second additional eonverted encryp*ion bit. T~e unit converted bit and the first and the at least one second additional converted bits are supplied to the adding section as the first and the second adding section input bits ct and dt and the at least one keying bit kt, respectively, Finally referring to Fig~ 9, a decrypting device is for producing a sequence of decrypted digits from a sequence of receive encrypted digits substantially identical with the original encrypted digit seauence produced by the encrypting deviee illustrated with reference to Figo 8~ A sequence of local clock pulses is for timing the receive encrypted and the decrypted digit6 with a local elock period equal to the encryption clock period, Each decrypted digit comprises first and second decrypted bits, which will again be designated by alt and a2t, Each receive enerypted digit eomprises first and second receive encrypted bits, denoted by blt and b2t In a modulo-tuo decr~rption adding section, a first decryption adder 91 is for calculating a first decryption sum modulo two of each first receive encrypted bit and at least one decryption keying bit produced as will presently be described ~ 8 3 The first decryption sums successively calculated for the respective first receive encrypted bi-ts, give a~sequence of the first decryp-ted bits, A combination of second through fifth decryption adders 92, 93, 94, and 95 is for calculating a second decryption sum modulo two of each second receive encrypted bit, the at least one decryption keying bit, each first receive enc~ypted bit, and first and second decryption adding section input bits, denoted by ct and dt, respecti~ely. In cooperation, the adders 92 through 95 produce a sequence of the second decrypted bits with each second decrypted bit given by the second decryption sum. ~ixth and seventh decryption adders 96 and 9~ are for calculating a third and a fourth decryption sum modulo two of each first receive encrypted bit and the first and the second decryption adding section input bits, respectively, The sixth and the seventh adders 96 and 97 produce first and sacond decryption adding section output bits ft and gt given by the third and the fourth decryption sums, respectively.
A decryption shift register section is responsiva to the local clock pulses supplied thereto as shift pulses. A unit decryption shift register 101 retains m second decrypted bits during each local clock period and produces a unit decryption bit pattern represented by the bits retained therein, A first additional decryption shift register 102 is for retaining ml first decryption adding section output bits t0 produce a first additional decryption shift register bit pattern represented by the retained bits, A second additional decryption shift register 103 is for retaining m2 s~cond decryption adding section output bits to produce a second additional shift register bit pattern 8 3 ~

represented by the retained bits.
In a decryption bit pattern converting section, a unit decryption blt pattern convertex 106 is preset with the unlt code pattern Kl and is responsive to the unit decryption shlft register bit pattern for producing a unit converted decryption bit, which is used as the first decryption adding ~ection input bit ct, A first additional decryption bit pattern converter 107 is for keeping the first additional bit pattern K2 and is responsive to the first additional decryption shift register bit pattern for producing a first additional converted decryption bit, wh.ich is supplied to the decryption adding section as the second decryption adding section input bit dt. A second additional decryption bit pattern converter 108 is for keeping the at least one additional code pattern K3 and re~ponsive to the second addition-al decryption shift register bit pattern for producing at least one additional converted decr~tion bit as the at least one decryp-tion keying bit kt.
It is possible to use the encryption device illustrated with reference to Fig. 8 in combination with any at least one of the encryption devices illustrated with reference to Figs.
1~ 2, 4, and 6 in encrypting a sequence of input data digits.
Each input data digit may comprise one or more dumm~ input data bits so as to represent three or a similar number of levels, Any one of the encryption bit patte~n Gonverters 41 through 43, 66, 67, and 86 through 88 may be modified according to the teaching described in connection with Fig, 2, Any one of the bit pattern converters 41 through 43 and 86 through 88 may be modified into the encryption bit pattern converter section ~ 3 17 described in conjunction with Fig, 4, Each of the bit pattern converters 41, 42, and 66 may be pre$et with a plurality of code patterns, which are equivalent to a single unlt or additional code pattern as regards software as described heretobefore~
Each code pattern may hava a pattern length either longer or shorter than the greatest possible number J of different memory output or shift register bit patterns, As has been pointed out in connection with the encrypting device with reference to Fig, 1, a shift register used in an encrypting device according to this invention is equivalent to a signal distributor, While this invention has thus far been described in specific conjunction with several embodiments thereof and a number of modlfications, it will now be readily feasible for one skilled in the art to carry this invention into effect in various other manners, For example, an input data bit or digit sequence may preliminarily be scrambled, before application to an encrypting device according to this invention, by a conventional scrambler comprising a maximal-length sequence generator, The number of the shift register or registers used in the encrypting device illustrated with reference to any one of Figs, 1, 2, 4, 6, and ~ is optional provided that the same permutation is used to provide the memory output or shift register bit pattern in ~he counterpart decrypting device as regards the parallel bit sequences into which the receive encrypted bit or digit sequence is distributed.
The adding section described in connection with Figs, 4, 6, and ô may be modified in various ways, with the adding section corresponding-ly modified in the cooperating decrypting device,

Claims (26)

WHAT IS CLAIMED IS:
1, An encrypting device for encrypting a sequence of input data bits into a sequence of encrypted bits in response to a sequence of clock pulses timing said input data bits and said encrypted bits with a predetermined clock period, comprising:
memory means responsive to the clock pulses for memorizing a predetermined number m of the encrypted bits during each clock period to produce a memory output bit pattern represented by the m encrypted bits memorized therein:
bit pattern converting means responsive to at least one code pattern for converting said memory output bit pattern to at least one keying bit; and modulo-two adding means for calculating a sum modulo two of each input data bit and said at least one keying bit to produce said sequence of encrypted bits with each encrypted bit given by said sum.
2. An encrypting device as claimed in Claim 1, wherein said bit pattern converting means comprises means for keeping a unit code pattern as said at least one code pattern and responsive to said memory output bit pattern for producing a unit keying bit as said at least one keying bit.
3. An encrypting device as claimed in Claim 1, wherein said bit pattern converting means comprises means for keeping a preselected number s of unit code patterns as said at least one code pattern and responsive to said memory output bit pattern for substantially simultaneously producing s keying bits as said at least one keying bit.
4. An encrypting device as claimed in Claims 1, 2, or 3, wherein said at least one code pattern consists of binary bits, equal in number to 2m.
5. An encrypting device as claimed in Claim 1, said memory means comprising a shift register which has first through (m-1)-th and m-th stages as counted from the stage supplied with each encrypted bit from said adding means and by which said clock pulses are used as shift pulses, said first through said (m-1)-th and said m-th stages simultaneously producing first through (m-1)-th and m-th output signals collectively as said memory output bit pattern, respectively, wherein said bit pattern converting means comprises:
a bit pattern converter for keeping a 2m-1-bit code pattern and responsive to said first through said (m-1)-th output signals for producing a first keying bit as one of said at least one keying bit; and a conductor responsive to said m-th output signal for producing a second keying bit as another of said at least one keying bit;
said at least one code pattern being equivalent to two 2m-1-bit code patterns, one being given by a concatenation of two code patterns, each being identical with said 2m-1-bit code pattern, the other being given by a succession of binary zeros, 2m-1 in number, followed by binary ones, 2m-1 in number.
6. An encrypting device as claimed in Claim 1, said at least one code pattern is at least two in number and given by a unit code pattern and at least one additional code pattern, wherein said bit pattern converting means comprises:

(Claim 6 continued) a unit bit pattern converter for keeping said unit code pattern and responsive to said memory output bit pattern for producing a converted bit;
a modulo-two adder for calculating a sum modulo two of said converted bit and the encrypted bit produced by said adding means during said each clock period to produce a sum bit given by the sum calculated thereby;
shift register means responsive to the clock pulses supplied thereto as shift pulses for retaining, during each clock period, a prescribed number of the sum bits successively produced by said adder to produce a shift register bit pattern represented by the sum bits retained therein; and additional bit pattern converting means responsive to said at least one additional code pattern for converting said shift register bit pattern to said at least one keying bit.
7. An encrypting device as claimed in Claim 1, said at least one code pattern is at least two in number and given by a unit code pattern and at least one additional code pattern, said at least one keying bit consisting of a unit keying bit and at least one additional keying bit, wherein said bit pattern converting means comprises: ' a unit bit pattern converter for keeping said unit code pattern and responsive to said memory output bit pattern for producing said unit keying bit;
at least a first and a second shift register responsive to the clock pulses supplied thereto as shift pulses for retaining, during each clock period, a first and a second prescribed number (Claim 7 continued) of the unit keying bits successively produced by said unit bit pattern converter, respectively, to produce in cooperation with each other a shift register bit pattern represented by the unit keying bits retained therein, respectively; and additional bit pattern converting means responsive to said at least one additional code pattern for converting said shift register bit pattern to said at least one additional keying bit.
8. An encryption device for encrypting a sequence of input data bits into a sequence of encrypted bits in response to a sequence of clock pulses timing said input data bits and said encrypted bits with a predetermined clock period, comprising:
modulo-two adding means for calculating a first sum modulo two of each encrypted bit and an adding means input bit and a second sum modulo two of each input data bit and at least one keying bit to produce a sum bit given by said first sum and said sequence of encrypted bits with each encrypted bit given by said second sum;
shift register means responsive to the clock pulses supplied thereto as shift pulses for retaining, during each clock period, a predetermined number m of the encrypted bits and a prescribed number of the sum bits successively produced by said adding means to produce a unit and an additional shift register bit pattern represented by the m encrypted bits retained therein and the sum bits retained therein, respectively;
bit pattern converting means responsive to a unit code pattern for converting said unit shift register bit pattern to (Claim 8 continued) a unit converted bit and responsive to at least one additional code pattern for converting said additional shift register bit pattern to at least one additional keying bit; and means for supplying said unit and said at least one additional converted bits to said adding means as said adding means input bit and said at least one keying bit, respectively.
9. An encrypting device as claimed in Claim 8, said at least one additional code pattern being two in number and given by a first and a second additional code pattern, wherein said bit pattern converting means comprises:
a unit bit pattern converter for keeping said unit code pattern and responsive to said unit shift register bit pattern for producing said unit converted bit;
a first additional bit pattern converter for keeping said first additional code pattern and responsive to said additional shift register bit pattern for producing an intermediate converted bit;
a modulo-two adder for calculating a sum modulo two of said intermediate converted bit and the encrypted bit produced by said adding means during said each clock period to produce an intermediate bit given by the sum calculated thereby;
a shift register responsive to the clock pulses supplied thereto as shift pulses for retaining, during each clock period, a preselected number of the intermediate bits successively produced by said adder to produce an auxiliary shift register bit pattern represented by the intermediate bits retained thereby; and (Claim 9 continued) a second additional bit pattern converter for keeping said second additional code pattern and responsive to said auxiliary shift register bit pattern for producing said at least one additional converted bit.
10. An encrypting device as claimed in claims 6 or 7, wherein said unit code pattern consists of binary bits, equal in number to 2m.
11. An encrypting device as claimed in claims 8 or 9, wherein said unit code pattern consists of binary bits, equal in number to 2m.
12. An encrypting device for encrypting a sequence of input data digits into a sequence of encrypted digits in response to a sequence of clock pulses timing said input data digits and said encrypted digits with a predetermined clock period, each input data digit comprising a first and a second input data bit, each encrypted digit comprising a first and a second encrypted bit, said device comprising:
modulo-two adding means for calculating a first sum modulo two of each first input data bit and at least one keying bit to produce a sequence of the first encrypted bits with each first encrypted bit given by said first sum, a second sum modulo two of each second input data bit, said at least one keying bit, each first encrypted bit, and a first and a second adding means input bit to produce a sequence of the second encrypted bits with each second encrypted bit given by said second sum, and a third and a fourth sum modulo two of each first encrypted bit and said first and said second adding means input bits to produce a first and a second adding means output bit given by said third and said fourth sums, respectively;

(Claim 12 continued) shift register means responsive to the clock pulses supplied thereto as shift pulses for retaining, during each clock period, a predetermined number m of the second encrypted bits, a first prescribed number m1 of the first adding means output bits successively produced by said adding means, and a second prescribed number m2 of the second adding means output bits successively pro-duced by said adding means to produce a unit and a first and a second additional shift register bit pattern represented by the m second encrypted bits and the m1 first and the m2 second adding means output bits retained therein, respec-tively;
bit pattern converting means responsive to a unit and a first and at least one second code pattern for converting said unit and said first and said second additional shift register bit patterns to a unit and a first and at least one second additional converted bit, respectively; and means for supplying said unit and said first and said at least one second additional converted bits to said adding means as said first and said second adding means input bits and said at least one keying bit, respectively.
13. An encrypting device as claimed in Claim 12, wherein said unit and said first and said at least one second code patterns consist of binary bits, equal in number to 2m, 2m1, and 2m2, respectively.
14. A decrypting device for decrypting a sequence of receive encrypted bits into a sequence of decrypted bits, said sequence of receive encrypted bits being substantially identical with a sequence of original encrypted bits produced by an encrypting device in response to a sequence of input data bits (Claim 14 continued) and a sequence of encryption clock pulses timing said input data bits and said original encrypted bits with a predetermined encryption clock period, said encrypting device comprising encryption memory means responsive to the clock pulses for memorizing a predetermined number m of the original encrypted bits during each clock period to produce an encryption memory output bit pattern represented by the m original encryption bits memorized therein, encryption bit pattern converting means reaponsive to at least one code pattern for converting said memory output bit pattern to at least one encryption keying bit, and encryption modulo-two adding means for calculating a sum modulo two of each input data bit and said at least one keying bit to produce said sequence of original encrypted bits with each original encrypted bit given by said sum, said decrypting device being responsive to a sequence of local clock pulses timing said receive encrypted bits and said decrypted bits with a local clock period equal to said predetermined encryption clock period and comprising;
decryption memory means responsive to said local clock pulses for memorizing m receive encrypted bits during each local clock period to produce a decryption memory output bit pattern represented by the m receive encrypted bits memorized therein;
decryption bit pattern converting means responsive to said at least one code pattern for converting said decryption memory output bit pattern to at least one decryption keying bit;
decryption modulo-two adding means for calculating a sum modulo two of each receive encrypted bit and said at least one decryption keying bit to pro-duce said sequence of decrypted bits with each decrypted bit given by the sum calculated by said decryption adding means.
15. A decrypting device as claimed in Claim 14, said encryption bit pattern converting means comprising means for keeping a unit code pattern as said at least one code pattern and responsive to said encryption memory output bit pattern for producing a unit encryption keying bit as said at least one encryption keying bit, wherein said decryption bit pattern converting means comprises means for keeping said unit code pattern as said at least one code pattern and responsive to said decryption memory output bit pattern for produc-ing a unit decryption keying bit as said at least one decryption keying bit.
16. A decrypting device as claimed in Claim 14, said encryption bit pattern converting means comprising means for keeping a preselected number s of unit code patterns as said at least one code pattern and responsive to said encryption memory output bit pattern for substantially simultaneously producing s encryption keying bits as said at least one encryption keying bit, wherein said decryption bit pattern converting means comprises means for keeping said s unit code patterns as said at least one code pattern and responsive to said decryp-tion memory output bit pattern for substantially simultaneously producing s decryption keying bits as said at least one decryption keying bit.
17. A decrypting device as claimed in Claims 14, 15, or 16, wherein said at least one code pattern consists of binary bits, equal in number to 2m.
18. A decrypting device as claimed in Claim 14, said encryption memory means comprising an encryption shift register which has first through (m-1)-th and m-th encryption stages as counted from the stage supplied with each original encrypted bit from said encryption adding means and by which said encryption clock pulses are used as shift pulses, said first through said (m-1)-th and (Claim 18 continued) said m-th stages simultaneously producing first through (m-1)-th and m-th encryption output signals collectively as said encryption memory output bit pattern, respectively, said encryption bit pattern converting means comprising an encryption bit pattern converter for keeping a 2m-1-bit code pattern and responsive to said first through said (m-1)-th output signals for producing a first encryption keying bit as one of said at least one encryption keying bit, and an encryption conductor responsive to said m-th output signal for producing a second encryption keying bit as another of said at least one encryption key-ing bit, said at least one code pattern being equivalent to two 2m- bit code patterns, one being given by a concatenation of two code patterns, each being identical with said 2m-1-bit code pattern, the other being given by a succession of binary zeros, 2m-1 in number, followed by binary ones, 2m-1 in number, wherein:
said decryption memory means comprises a decryption shift register which has first through (m-1)-th and m-th decryption stages as counted from the decryption stage supplied with each receive encrypted bit supplied also to said decryption adding means and by which said local clock pulses are used as shift pulses, said first through said (m-1)-th and said m-th decryption stages simultaneously producing first through (m-1)-th and m-th decryption output sig-nals collectively as said decryption memory output bit pattern;
said decryption bit pattern converting means comprising:
a decryption bit pattern converter for keeping said 2m-1-bit code pattern and responsive to said first through said (m-1)-th decryption output signals for producing a first decryption keying bit as one of said at least one decryption keying bit;

(Claim 18 continued) and a decryption conductor responsive to said m-th decryption output sig-nal for producing a second decryption keying bit as another of said at least one decryption keying bit.
19. A decrypting device as claimed in Claim 14, said at least one code pattern being at least two in number and given by a unit code pattern and at least one additional code pattern, said encryption bit pattern converting means comprising a unit encryption bit pattern converter for keeping said unit code pattern and responsive to said encryption memory output bit pattern for produc-ing a converted encryption bit, an encryption modulo-two adder for calculating a sum modulo two of said converted bit and the original encrypted bit produced by said encryption adding means during said each encryption clock period to produce an encryption sum bit given by the sum calculated by said adder, encryption shift register means responsive to the encryption (Claim 19 continued) clock pulses supplied thereto as shift pulses for retaining, during each encryption clock period, a prescribed number m' of the sum bits successively produced by said adder to produce an encryption shift register bit pattern represented by the m' sum bits retained therein, and additional encryption bit pattern converting means responsive to said at least one additional code pattern for converting said encryption shift register bit pattern to said at least one encryption keying bit, wherein said decryption bit pattern converting means comprises:
a unit decryption bit pattern converter for keeping said unit code pattern and responsive to said decryption memory output bit pattern for producing a converted decryption bit;
a decryption modulo-two adder for calculating a sum modulo two of said converted decryption bit and the receive encrypted bit supplied also to said decryption adding means during said each local clock period to produce a decryption sum bit given by the sum calculated by said decryption adder;
decryption shift register means responsive to the local clock pulses supplied thereto as shift pulses for retaining, during each local clock period, m' decryption sum bits successively produced by said decryption adder to produce a decryption shift register bit pattern represented by the m' decryption sum bits retained therein; and additional decryption bit pattern converting means responsive to said at least one additional code pattern for converting said decryption shift register bit pattern to said at least one decryption keying bit.
48 A decrypting device as claimed in Claim 14, said at least one code pattern being at least two in number and given by a unit code pattern and at least one additional code pattern, said at least one encryption keying bit consisting of a unit encryption keying bit and at least one additional encryption keying bit, said at least one decryption keying bit consisting of a unit decryption keying bit and at least one additional decryption keying bit, said at least one additional decryption keying bit being equal in number to said at least one additional encryption keying bit, said encryption bit pattern converting means comprising a unit encryption bit pattern converter for keeping said unit code pattern and responsive to said encryption memory output bit pattern for producing said unit encryption keying bit, encryption shift register means responsive to the encryption clock pulses supplied thereto as shift pulses for retaining, during each encryption clock period, a prescribed number m' of the unit encryption keying bits successively produced by said unit encryption bit pattern converter to produce an encryption shift register bit pattern represented by the m' unit encryption keying bits retained therein, and additional encryption bit pattern converting means responsive to said at least one additional code pattern for converting said encryption shift register bit pattern to said at least one additional encryption keying bit, wherein said decryption bit pattern converting means comprises:
a unit decryption bit pattern converter for keeping said unit code pattern and responsive to said decryption memory output bit pattern for producing said unit decryption keying bit;

(Claim 20 continued) decryption shift register means responsive to the local clock pulses supplied thereto as shift pulses for retaining, during each local clock period, m' unit decryption keying bits successively produced by said unit decryption bit pattern converter to produce a decryption shift register bit pattern represented by the m' unit decryption keying bits retained therein; and additional decryption bit pattern converting means responsive to said at least one additional code pattern for converting said decryption shift register bit pattern to said at least one additional decryption keying bit,
21. A decrypting device for decrypting a sequence of receive encrypted bits into a sequence of decrypted bits, said sequence of receive encrypted bits being substantially identical with a sequence of original encrypted bits produced by an encrypting device in response to a sequence of input data bits and a sequence of encryption clock pulses timing said input data bits and said original encrypted bits with a predetermined encryption clock period, said encrypting device comprising modulo-two encryption adding means for calculating a first encryption sum modulo two of each original encrypted bit and an encryption adding means input bit and a second encryption sum modulo two of each input data bit and at least one encryption keying bit to produce an encryption sum bit given by said first sum and said sequence of original encrypted bits with each original encrypted bit given by said second sum, encryption shift register means responsive to the encryption clock pulses supplied thereto as shift pulses for retaining, during each encryption clock period, a predetermined (Claim 21 continued) number m of the original encrypted bits and a prescribed number m' of the sum bits successively produced by said adding means to produce a unit and an additional encryption shift register bit pattern represented by the m original encrypted bits retained therein and the m' sum bits retained therein, respectively, encryption bit pattern converting means responsive to a unit code pattern for converting said unit shift register bit pattern to a unit converted encryption bit and responsive to at least one additional code pattern for converting said additional shift register bit pattern to at least one additional converted encryption bit, and feedback means for supplying said unit and said at least one additional converted encryption bits to said adding means as said adding means input bit and said at least one encryption keying bit, respectively, said decrypting device being responsive to a sequence of local clock pulses timing said receive encrypted bits and said decrypted bits with a local clock period equal to to said predetermined encryption clock period and comprising:
modulo-two decryption adding means for calculating a first decryption sum modulo two of each receive encrypted bit and a decryption adding means input bit and a second decryption sum modulo two of each receive encrypted bit and at least one decryption keying bit to produce a decryption sum bit given by said first decryption sum and said sequence of decrypted bits with each decrypted bit given by said second decryption sum;
decryption shift register means responsive to the local clock pulses supplied thereto as shift pulses for retaining, during each local clock period, m receive encrypted bits and (Claim 21 twice continued) m' decryption sum bits successively produced by said decryption adding means to produce a unit and an additional decryption shift register bit pattern represented by the m receive encrypted bits retained therein and the m' decryption sum bits retained therein, respectively;
decryption bit pattern converting means responsive to said unit code pattern for converting said unit decryption shift register bit pattern to a unit converted decryption bit and responsive to said at least one additional code pattern for converting said additional decryption shift register bit pattern to at least one additional converted decryption bit; and feedforward means for supplying said unit and said at least one additional converted decryption bits to said decryption adding means as said decryption adding means input bit and said at least one decryption keying bit, respectively.
22. A decrypting device as claimed in Claim 21, said at least one additional code pattern being two in number and given by a first and a second additional code pattern, said encryption bit pattern converting means comprising a unit encryption bit pattern converter for keeping said unit code pattern and responsive to said unit encryption shift register bit pattern for producing said unit converted encryption bit, a first additional encryption bit pattern converter for keeping said first additional code pattern and responsive to said additional encryption shift register bit pattern for producing an intermediate converted encryption bit, a modulo-two encryption adder for calculating a sum modulo two of said intermediate converted encryption bit and the original (Claim 22 continued) encrypted bit produced by sail encryption adding means during said each encryption clock period to produce an intermediate encryption bit given by the sum calculated thereby, an encryption shift register responsive to the encryption clock pulses supplied thereto as shift pulses for retaining, during each encryption clock period, a preselected number m" of the intermediate bits successively produced by said adder to produce an auxiliary encryption shift register bit pattern represented by the m" intermediate bits retained therein, and a second additional encryption bit pattern converter for keeping said second additional code pattern and responsive to said auxiliary shift register bit pattern for producing said at least one additional converted encryption bit, wherein said decryption bit pattern converting means comprises:
a unit decryption bit pattern converter for keeping said unit code pattern and responsive to said unit decryption shift register bit pattern for producing said unit converted decryption bit;
a first additional decryption bit pattern converter for keeping said first additional code pattern and responsive to said additional decryption shift register bit pattern for producing an intermediate converted decryption bit;
a decryption modulo-two adder for calculating a sum modulo two of said intermediate converted decryption bit and the receive encrypted bit supplied also to said decryption adding means during said each local clock period to produce an intermediate decryption bit given by the sum calculated thereby;

(Claim 22 twice continued) a decryption shift register responsive to the local clock pulses supplied thereto as shift pulses for retaining, during each local clock period, m" intermediate decryption bits successively produced by said decryption adder to produce an auxiliary decryption shift register bit pattern represen-ted by the m" intermediate decryption bits retained therein; and a second additional decryption bit pattern converter for keeping said second additional code pattern and responsive to said auxiliary decryp-tion shift register bit pattern for producing said at least one additional converted decryption bit.
23. A decrypting device as claimed in claim 19 or 20, wherein said unit code pattern consists of binary bits, equal in number to 2?.
24. A decrypting device as claimed in claims 21 or 22, wherein said unit code pattern consists of binary bits, equal in number to 2?.
25. A decrypting device for decrypting a sequence of receive encrypted digits into a sequence of decrypted digits, said sequence of receive encrypted digits being substantially identical with a sequence of original encrypted digits produced by an encrypting device in response to a sequence of input data digits and a sequence of encryption clock pulses timing said input data digits and said original encrypted digits with a predetermined encryption clock period, each input data digit comprising a first and a second input data bit, each original encrypted digit comprising a first and a second original encrypted bit, each receive encrypted digit comprising a first and a second receive encrypted bit, said encrypting device comprising modulo-two encryption adding means for calculating a first encryption sum modulo two of each first input data bit and at least one encryption (Claim 25 continued) keying bit to produce a sequence of the first original encrypted bits with each first original encrypted bit given by said first sum, a second encryption sum modulo two of each second input data bit, said at least one keying bit, each first original encrypted bit, and a first and a second encryption adding means input bit to produce a sequence of the second original encrypted bits with each second original encrypted bit given by said second sum, and a third and a fourth encryption sum modulo two of each first original encrypted bit and said first and said second adding means input bits to produce a first and a second encryption adding means output bit given by said third and said fourth sums, respective-ly, encryption shift register means responsive to the encryption clock pulses supplied thereto as shift pulses for retaining, during each encryption clock period, a predetermined number m of the second original encrypted bits, a first prescribed number m1 of the first adding means output bits successively produced by said adding means, and a second prescribed number m2 of the second adding means output bits successively produced by said adding means to produce a unit and a first and a second additional encryption shift register bit pattern represented by the m second original encrypted bits and the m1 first and the m2 second adding means output bits retained therein, respectively, encryption bit pattern converting means responsive to a unit and a first and at least one second additional code pattern for converting said unit and said first and said second additional shift register bit patterns to a unit and a first and at least one second additional converted encryption bit, respectively, and feedback means for (Claim 25, twice continued) supplying said unit and said first and said at least one second additional converted bits to said adding means as said first and said second adding means input bits and said at least one keying bit, respectively, wherein said decrypting device is responsive to a sequence of local clock pulses timing said receive encrypted digits and said decrypted digits with a local clock period equal to said encryption clock period and comprises;
modulo-two decryption adding means for calculating a first decryption sum modulo two of each first receive encrypted bit and at least one decryption keying bit to produce a sequence of the first decrypted bits with each first decrypted bit given by said first decryption sum, a second decryption sum modulo two of each second receive encrypted bit, said at least one decryption keying bit, each first receive encrypted bit, and a first and a second decryption adding means input bit to produce a sequence of the second decrypted bits with each second decrypted bit given by said second decryption sum, and a third and a fourth decryption sum modulo two of each first receive encrypted bit and said first and said second decryption adding means input bits to produce a first and a second decryption adding means output bit given by said third and said fourth decryption sums, respectively;
decryption shift register means responsive to the local clock pulses supplied thereto as shift pulses for retaining, during each local clock period, m second receive encrypted bits, m1 first decryption adding means output bits successively produced by said decryption adding means, and m2 second decryption adding means output bits successively produced by said decryption adding (Claim 25 three times continued) means to produce a unit and a first and a second additional decryption shift register bit pattern represented by the m second receive encrypted bits and the m1 first and the m2 second decryption adding means output bits retained therein, respectively;
decryption bit pattern converting means responsive to said unit and said first and said at least one second additional code patterns for converting said unit and said first and said second additional decryption shift register bit patterns to a unit and a first and at least one second additional converted decryption bit, respectively; and feedforward means for supplying said unit and said first and said at least one second additional converted decryption bits to said decryption adding means as said first and said second decryption adding means input bits and said at least one decryption keying bit, respectively.
26. A decrypting device as claimed in Claim 24, wherein said unit and said first and said at least one second additional code patterns consist of binary bits, equal in number to 2?, 2m1, and 2m2. respectively.
CA000387315A 1980-10-06 1981-10-05 Device for encrypting each input data bit by at least one keying bit decided by a code pattern and a bit pattern of a predetermined number of preceding encrypted bits Expired CA1181830A (en)

Applications Claiming Priority (4)

Application Number Priority Date Filing Date Title
JP139596/1980 1980-10-06
JP55139596A JPS5763950A (en) 1980-10-06 1980-10-06 System and device for ciphering
JP34890/1981 1981-03-11
JP56034890A JPS57150251A (en) 1981-03-11 1981-03-11 Code converter

Publications (1)

Publication Number Publication Date
CA1181830A true CA1181830A (en) 1985-01-29

Family

ID=26373763

Family Applications (1)

Application Number Title Priority Date Filing Date
CA000387315A Expired CA1181830A (en) 1980-10-06 1981-10-05 Device for encrypting each input data bit by at least one keying bit decided by a code pattern and a bit pattern of a predetermined number of preceding encrypted bits

Country Status (2)

Country Link
US (1) US4447672A (en)
CA (1) CA1181830A (en)

Families Citing this family (33)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
DE3127843A1 (en) * 1981-07-15 1983-05-26 AEG-Telefunken Nachrichtentechnik GmbH, 7150 Backnang METHOD FOR PREVENTING "COMPROMISING RADIATION" IN PROCESSING AND TRANSMITTING SECRET DATA INFORMATION
US4663500A (en) * 1982-02-22 1987-05-05 Nec Corporation Cryptographic system
US4520232A (en) * 1982-04-30 1985-05-28 Wilson William J Polygraphic encryption-decryption system
US4694412A (en) * 1982-09-22 1987-09-15 Intel Corporation Random number generator for use in an authenticated read-only memory
US4596898A (en) * 1984-03-14 1986-06-24 Computer Security Systems, Inc. Method and apparatus for protecting stored and transmitted data from compromise or interception
FR2582174B1 (en) * 1985-05-15 1990-03-09 Thomson Csf SUBSTITUTION-PERMUTATION ENCRYPTION DEVICE
US4685132A (en) * 1985-07-30 1987-08-04 Sperry Corporation Bent sequence code generator
US4760599A (en) * 1985-11-07 1988-07-26 Nec Corporation Data encryptor
US4791669A (en) * 1985-11-30 1988-12-13 Nec Corporation Encryption/decryption system
US4731843A (en) * 1985-12-30 1988-03-15 Paradyne Corporation Method and device of increasing the execution speed of cipher feedback mode of the DES by an arbitrary multiplier
US4736424A (en) * 1986-09-22 1988-04-05 Rockwell International Corporation Data scrambling apparatus
US4815130A (en) * 1986-10-03 1989-03-21 Communications Satellite Corporation Stream cipher system with feedback
US4972475A (en) * 1987-02-10 1990-11-20 Veritec Inc. Authenticating pseudo-random code and apparatus
JPH0727325B2 (en) * 1987-02-13 1995-03-29 沖電気工業株式会社 Encryption device
US4771462A (en) * 1987-02-18 1988-09-13 Hannan Forrest A Communication port encryption/decryption method and apparatus
GB2204465B (en) * 1987-05-01 1991-06-19 Philips Electronic Associated A method of and an arrangement for digital signal encryption
US4878246A (en) * 1988-05-02 1989-10-31 Pitney Bowes Inc. Method and apparatus for generating encryption/decryption key
DE59007408D1 (en) * 1989-02-08 1994-11-17 Gretag Data Systems Ag Method for cryptographic handling of data and cryptographic system.
US4930139A (en) * 1989-05-31 1990-05-29 O'neill Communications, Inc. Spread spectrum communication system
US5177788A (en) * 1991-10-15 1993-01-05 Ungermann-Bass, Inc. Network message security method and apparatus
US5307412A (en) * 1992-09-30 1994-04-26 Vobach Arnold R Random coding cipher system and method
US5335280A (en) * 1993-01-28 1994-08-02 Vobach Arnold R Random sum cipher system and method
JP3029381B2 (en) * 1994-01-10 2000-04-04 富士通株式会社 Data converter
NL9400176A (en) * 1994-02-04 1995-09-01 Nederland Ptt Cryptographic device.
US5796836A (en) * 1995-04-17 1998-08-18 Secure Computing Corporation Scalable key agile cryptography
CA2177622A1 (en) * 1996-05-29 1997-11-30 Thierry Moreau Cryptographic data integrity apparatus and method based on pseudo-random bit generators
US6459792B2 (en) * 1997-04-23 2002-10-01 Matsushita Electric Industrial Co., Ltd. Block cipher using key data merged with an intermediate block generated from a previous block
US6192139B1 (en) * 1999-05-11 2001-02-20 Sony Corporation Of Japan High redundancy system and method for watermarking digital image and video data
US7672453B1 (en) * 2000-08-21 2010-03-02 Lockheed Martin Corporation Data encryption by nonlinear transfer function
EP1320026A1 (en) * 2001-12-13 2003-06-18 STMicroelectronics S.r.l. Method for generating a random number sequence and a relative random bit generator
RU2003131278A (en) * 2002-10-29 2005-04-20 Хай-О Информтех Эсдиэн Биэйчди (MY) DATA ENCRYPTION METHOD
WO2010041307A1 (en) * 2008-10-07 2010-04-15 富士通株式会社 Encrypting apparatus
US8958550B2 (en) * 2011-09-13 2015-02-17 Combined Conditional Access Development & Support. LLC (CCAD) Encryption operation with real data rounds, dummy data rounds, and delay periods

Family Cites Families (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US30957A (en) * 1860-12-18 Improved steam-boiler
NL287518A (en) * 1962-01-10
US4187392A (en) * 1962-06-08 1980-02-05 American Standard Inc. Synchronous universal binary scrambler
US4304962A (en) * 1965-08-25 1981-12-08 Bell Telephone Laboratories, Incorporated Data scrambler
US3639690A (en) * 1969-09-10 1972-02-01 Motorola Inc Digital privacy system
US3796830A (en) * 1971-11-02 1974-03-12 Ibm Recirculating block cipher cryptographic system
US3784743A (en) * 1972-08-23 1974-01-08 Bell Telephone Labor Inc Parallel data scrambler
USRE30957E (en) 1973-10-15 1982-06-01 International Business Machines Corporation Variant key matrix cipher system
US3920894A (en) * 1974-03-11 1975-11-18 Bell Telephone Labor Inc Pseudo-random parallel word generator
DE2658065A1 (en) * 1976-12-22 1978-07-06 Ibm Deutschland MACHINE ENCRYPTION AND DECHIFREEZE
DE2706421C2 (en) * 1977-02-16 1979-03-15 Licentia Patent-Verwaltungs-Gmbh, 6000 Frankfurt Procedure for setting ciphertext generators in encryption devices
US4172213A (en) * 1977-11-17 1979-10-23 Burroughs Corporation Byte stream selective encryption/decryption device

Also Published As

Publication number Publication date
US4447672A (en) 1984-05-08

Similar Documents

Publication Publication Date Title
CA1181830A (en) Device for encrypting each input data bit by at least one keying bit decided by a code pattern and a bit pattern of a predetermined number of preceding encrypted bits
EP0518315B1 (en) System and method for blockwise encryption of data
US4304962A (en) Data scrambler
JP3229148B2 (en) Encryption method and system
US4797921A (en) System for enciphering or deciphering data
EP0002389B1 (en) Multiple domain data communication
US4668103A (en) Polygraphic encryption-decryption communications system
US4238853A (en) Cryptographic communication security for single domain networks
US4221931A (en) Time division multiplied speech scrambler
EP0343930B1 (en) Data signal processing apparatus
US6125182A (en) Cryptographic engine using logic and base conversions
EP0388031A2 (en) Reliability enhancement of nonvolatile tracked data storage devices
CA1099023A (en) Method and system for transmitting and receiving interleaved blocks of encoded data words to minimize error distortion in the recovery of said data words
JPH028503B2 (en)
US4356564A (en) Digital signal transmission system with encoding and decoding sections for correcting errors by parity signals transmitted with digital information signals
EP1020856A2 (en) Data protection method using decryption key concealed in compliant mark
US7505589B2 (en) Ternary and higher multi-value digital scramblers/descramblers
US3745528A (en) Error correction for two tracks in a multitrack system
EP1119130B1 (en) Cryptosystem-related method and apparatus
JP2002108711A (en) Data processor and data processing method
US20010033654A1 (en) W-EC1 encryption and decryption method and system
US4779276A (en) Data transmission system
US4680791A (en) Digital video signal process apparatus for use in a video tape recorder
USRE28923E (en) Error correction for two bytes in each code word in a multi-code word system
EP0354065A2 (en) Digital data modulation circuit and method and digital data demodulation circuit

Legal Events

Date Code Title Description
MKEX Expiry